The National Security Agency believes that last month’s WannaCry attacks were perpetrated by the government of North Korea. The NSA, reported the Washington Post, believes with “moderate confidence” that the WannaCry attackers were sponsored by the the North Korean Reconnaissance General Bureau.
WannaCry ransomware paralysed endpoints and organisations in more than 150 countries, including nearly 50 NHS trusts, US Fedex, Spanish Telefonica, French Renault factories, a Chinese energy company and the Russian interior ministry. The campaign was also notable not just for the scalps it claimed, but for being the first combination of ransomware with a network worm.
The worm was EternalBlue, developed by the NSA to exploit a vulnerability in the Microsoft SMBv1 server and later released into the public domain by the hacking group Shadow Brokers.
Early analysis suggested that for all its reach and impact, WannaCry ransomware was not very sophisticated, though its worm aspect was. Using EternalBlue, the attackers managed to propagate what appeared to be a mediocre piece of ransomware on a massive scale.
If it was a money-making ploy by the North Korean government, then it appears to have failed. By the end of the attack, the wallets into which the victims were directed to pay the ransoms contained just over £109,000.
Jake Williams, founder of Rendition Infosec, told the Washington Post that the ransomware may have “gotten loose” during testing, which might explain its shortcomings.
North Korea was quickly blamed by a range of experts, including Symantec which said that the campaign bore the hallmarks of previous attacks the country is believed to have carried out.
Attribution is often a controversial practice and few claims are left unblemished with criticism. When fingers first pointed towards North Korea for the WannaCry attacks, a report from the Institute of Critical Infrastructure Technology (ICIT) called the claims “hasty” and the evidence “circumstantial at best”.
Incredulity might be understandable. Purely financial objectives are rarely what motivates APT groups. However, a nation state with the motivation of a cyber-criminal seems to be a unique characteristic of North Korea.
As a country isolated by its despotic regime, cultural autarky and historical hostility to the outside, North Korea is subject to heavy sanctions among the international community. A way of circumventing these sanctions has been engaging in illegal but lucrative activity. Foreign bureaus of the North Korean government have been known to engage in drug trafficking and counterfeiting operations among other illicit practices.
One recent development, which has been all but proven, is that the South Asian despotism now engages in cyber-crime to fill its meagre state coffers. The group behind this, and many other attacks, is known as Lazarus.
Its fingerprints have been seen on the 2012 attack against Sony, which is believed to have been carried out in retaliation for the release of a film satirising the North Korean dictator.
More recently Lazarus has been implicated in the attack on the Bangladesh Central Bank, in which robbers maneuvered US$81 million out of the bank’s accounts by placing fraudulent money orders through the global SWIFT network, before exfiltrating the funds through a series of east Asian casinos.
A response, political or otherwise, has not yet been formulated, but considering the scale of the attack, it’s hard to imagine there won’t be one.
This article originally appeared at scmagazineuk.com